A Novel Fragile Watermarking Technique with High Accuracy Tamper Localization

Author(s):  
M. Erturkler ◽  
Y. Tatar
2021 ◽  
pp. 749-757
Author(s):  
Shambhu Shankar Bharti ◽  
Shivendra Shivani ◽  
Sudhir Kumar Pandey ◽  
Suneeta Agarwal

2016 ◽  
Vol 8 (1) ◽  
pp. 1-25 ◽  
Author(s):  
Nana Wang

For 2D vector maps, obtaining high tamper localization accuracy without requiring extra space is a technically challenging problem. Using an adaptive group division approach and an improved reversible data hiding approach, the author proposes a reversible fragile watermarking method for locating tampered Polylines/Polygons in 2D vector maps. In particular, the author adaptively divide the features of the vector map into groups according to a predefined threshold, calculate an authentication watermark for each group, embed the watermark using the improved reversible data hiding approach, and hide the mark of each feature into the feature itself. Since the adaptive group division method and the improved reversible data hiding method are combined in an attempt to make full use of the watermark embedding space, superior tamper localization accuracy and original content recovery can be ensured. Besides, no extra space is required by hiding the mark of each feature. Experimental results have been provided to demonstrate the effectiveness of our method.


2013 ◽  
Vol 401-403 ◽  
pp. 1772-1775
Author(s):  
Hui Fen Huang

For existing airspace fragile authentication watermarking algorithm positioning accuracy and security issues, this paper presents a fully-fragile watermarking based on chaos for the integrity of the image content authentication and tamper localization. The algorithm uses the original image block, the calculation of each pixel in the image block high-bit gray value as the image feature watermark information. The chaotic sequence is encrypted and determines the position of the watermark bit is embedded watermark information, tampering with the positioning accuracy of an image block of 2 × 2 pixels. Experimental results show that the algorithm is simple, safe, with good practice.


The watermarking scheme in digital media communication has become an essential tool in helping content creators prove ownership if any dispute arises in copyright infringement. In this paper, Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is performed in the watermarking process which improves the authentication of the image and the detection of the tampered region. The semi-fragile watermarking scheme provides robustness to the watermark during extraction process even after the unintentional compression attacks like JPEG compression. The watermark payload is significantly lowered in order to increase the quality of the image. The recovery is done using the absolute moment block truncation coding (AMBTC) of the image in the untampered region. Thus, both the mean and first absolute moment are used in recovering the tampered regions in the watermarked image.


2015 ◽  
Vol 7 (3) ◽  
pp. 60-80 ◽  
Author(s):  
Nana Wang ◽  
Xiangjun Zhao ◽  
Han Zhang

In this paper, the authors propose a block-based reversible watermarking method for 2D vector map authentication. In the scheme, they divide the features of a vector map into different categories of blocks, calculate an authentication watermark for each block, and embed the watermarks of different blocks using a reversible watermarking method based on virtual coordinates and a fragile watermarking algorithm based on concentric circles. While the block division ensures superior accuracy of tamper localization, the two watermarking methods provide recovery of the original content. Experimental results show that the proposed scheme has good invisibility, reversibility and computational complexity, and can accurately locate malicious attacks such as vertex modification/addition/deletion and feature modification/addition/deletion.


2013 ◽  
Vol 325-326 ◽  
pp. 1555-1558
Author(s):  
Jun Peng Zhang ◽  
Qing Fan Zhang ◽  
Xiu Ying Xie

In this paper, an effective self-embedding fragile watermarking scheme is proposed. The watermark is generated by encoding the DCT coefficients of each 2×2 block and embedded into another block. A non-linear pseudo random sequence is used for generating the block mapping which can enhance the security of the algorithm. An improved tamper localization and recovery algorithm are performed. The experiment results show that the tamper region can be successfully localized and exactly recovered, even if under the content-only tampering.


Sign in / Sign up

Export Citation Format

Share Document